Entries by Student

write my assignment 12259

“Use the following information to answer questions # 7 through 15Enron CorporationBalance Sheet12/31/XX(in thousands of dollars)Cash $ 150 Accounts Payable $100Accounts Receivable 250 Notes Payable 250Inventory 600 Other Current Liabilities 50Total Current Assets $1,000 Total Current Liabilities $400Total Fixed Assets 1,500 Long Term Debt $1,100Common Stock 800Retained Earnings 200Total Assets $2,500 Total Liab. & Equity $2,500Number of shares outstanding = 10,000 sharesPrice per Share = $100Enron CorporationIncome Statementfor the year ending 12/31/XX(in thousands of dollars)Net sales $ 2,700Operating Costs (2,350)Depreciation ( 150)Interest Expense ( 70)EBT 130Income Tax (40%) ( 52)Net Income $ 78Dividends to Common Stock = $ 58Calculate each of the following ratios. Be sure to give the complete equation as well as the solution:7. Current ratio8. Quick ratio9. Total Debt/Total Asset Ratio10. Inventory Turnover Ratio11. ROE12. TIE13. EPS14. Net Profit Margin15. Total Assets Turnover Ratio

Ratio7. Current ratio8. Quick ratio9. Total Debt/Total Asset Ratio10. Inventory Turnover Ratio11. ROE12. TIE13. EPS14. Net Profit Margin15. Total Assets Turnover Ratio FormulaCurrent…

 

"Not answered?"


Get the Answer

write my assignment 21937

Hi, I need help with essay on Network Access Using Correct Credentials. Paper must be at least 750 words. Please, no plagiarized work!

Additionally, other abnormal computers like automatic dialing the internet may also be an indicator. Further, use of keyloggers can be essential in keeping a log of the number of times your account has been accessed. However, copying of small files may not increase network activity significantly so it may be hard to detect. Furthermore, shared folders are freely accessible on the network without the use of a password.

The situation discussed above differs from packet sniffing. In it, there is no software required to access the folders as they are already shared and the password is also known. Additionally, packet sniffing is an illegal practice of intercepting network traffic to and from a computer on a network. The limit of what may be accessed through both of these methods is also different. While packet sniffing can access everything sent over the network, the above scenario does not include such capabilities. Using password to access a local computer is much easier than packet sniffing.

The situation in question 2 is real and very likely in a work situation. Numerous cases of employees stealing information from their colleagues have been reported. One simple way for protection in such case is the change of password. Changing passwords constantly will ensure that someone has difficulty ever using your password to access your computer. Another method is by use of the firewall. A firewall may be a hardware or a software program which restricts unauthorized external access to a local machine or an internal network. Additionally, a review of which folders and files to share and which not to share is also important.

The designers who had their systems attacked by a worm and their designs stolen would have known of this intrusion and subsequent theft of designs. An antivirus software installed on the computer is one sure way for such detection.&nbsp.

 

"Not answered?"


Get the Answer

write my assignment 5899

Two friends, Mike and Jake were returning late at night from a club in the same car. Suddenly, Mike, who was driving, lost control of the car and they crashed into a big tree. Mike ended up with only a few bruises and scratches, but Jake got hurt. 

Jake had internal bleeding and was taken to a hospital, but he lost a lot of blood and needed a blood transfusion. Mike, feeling responsible for his friend’s condition, wanted to donate blood to his friend. Both Mike and Jake had blood type O. So, in the ER, Mike gave 2 pints of blood to Jake. 

Two weeks later, Jake became anemic. So, Mike, being a good friend, decided to give blood again. However, after the second transfusion, Jake went into an anaphylactic shock (severe immune response) and almost died. 

What, do you think, was the problem here? 

 

"Not answered?"


Get the Answer

write my assignment 26433

$500,000

The company president believes that it’s foolish to continue producing two essentially equivalent products. At the same time, the corporate image is somewhat tarnished because of a toxic dump found at another site (not the Valley plant). The president would like to be able to point to the Valley plant as an example of company research and development (R&D) working to provide an environmentally friendly product. The controller points out to the president that the company’s financial position is shaky, and it cannot afford to make products in any way other than the most cost-efficient one.

Required:

a. 3C’s current cost accounting system charges overhead to products based on direct labor cost using a single plantwide rate. What product costs will it report for the two products if the current allocation system is used?

b. The controller recently completed an executive education course describing the two-stage allocation procedure. Assume that the first stage allocates costs to departments and the second stage allocates costs to products. The controller believes that the costs will be more accurate if machine-hours are used to allocate Production Department costs and labor-hours are used to allocate Assembly Department costs. What product costs will be reported for the two products if the two-stage allocation process is used?

2

c. The company decides to compute product costs assuming an ABC system is implemented only in the Production Department. Overhead in Assembly will continue to be allocated based on direct labor cost. The cost drivers selected for the activity-based costing system are: 

Supervision

Testing

Depreciation on equipment

Direct labor-hours

Testing hours

Machine-hours

What product costs would be reported if this ABC system were implemented? Assume that the production mix and costs would remain as originally planned.

d. Please briefly discuss the advantages and disadvantages of the three cost allocation methods above, including traditional single plantwide rate cost allocation, two-stage departmental allocation, and activity-based costing. What is your suggestion for the president if you were the controller?

e. Because the two products are identical in their use, the controller argues that the decision should be made on cost alone. Do you agree? Explain. 

 

"Not answered?"


Get the Answer